A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks

In wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user...

Full description

Bibliographic Details
Main Authors: Ke Zhang, Kai Xu, Fushan Wei
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/2484268
id doaj-e430ff7411e64807bfdcd9af711082ab
record_format Article
spelling doaj-e430ff7411e64807bfdcd9af711082ab2020-11-24T23:34:34ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/24842682484268A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor NetworksKe Zhang0Kai Xu1Fushan Wei2Network Information Center, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an 710054, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, ChinaIn wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user anonymity. In order to overcome these shortcomings, we propose an anonymous authenticated key exchange protocol based on Elliptic Curves Cryptography (ECC). The novel protocol provides strong user anonymity such that even the gateway node and the sensor nodes do not know the real identity of the user. The security of the proposed protocol is conducted in a well-defined security model under the CDH assumption. Compared with other related protocols, our protocol is efficient in terms of communication and enjoys stronger security. The only disadvantage is that our protocol consumes more computation resources due to the usage of asymmetric cryptography mechanisms to realize strong anonymity. Consequently, our protocol is suitable for applications which require strong anonymity and high security in wireless sensor networks.http://dx.doi.org/10.1155/2018/2484268
collection DOAJ
language English
format Article
sources DOAJ
author Ke Zhang
Kai Xu
Fushan Wei
spellingShingle Ke Zhang
Kai Xu
Fushan Wei
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
Wireless Communications and Mobile Computing
author_facet Ke Zhang
Kai Xu
Fushan Wei
author_sort Ke Zhang
title A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
title_short A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
title_full A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
title_fullStr A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
title_full_unstemmed A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
title_sort provably secure anonymous authenticated key exchange protocol based on ecc for wireless sensor networks
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description In wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user anonymity. In order to overcome these shortcomings, we propose an anonymous authenticated key exchange protocol based on Elliptic Curves Cryptography (ECC). The novel protocol provides strong user anonymity such that even the gateway node and the sensor nodes do not know the real identity of the user. The security of the proposed protocol is conducted in a well-defined security model under the CDH assumption. Compared with other related protocols, our protocol is efficient in terms of communication and enjoys stronger security. The only disadvantage is that our protocol consumes more computation resources due to the usage of asymmetric cryptography mechanisms to realize strong anonymity. Consequently, our protocol is suitable for applications which require strong anonymity and high security in wireless sensor networks.
url http://dx.doi.org/10.1155/2018/2484268
work_keys_str_mv AT kezhang aprovablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks
AT kaixu aprovablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks
AT fushanwei aprovablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks
AT kezhang provablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks
AT kaixu provablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks
AT fushanwei provablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks
_version_ 1725528823121838080